Free Ebook Video Training

Thursday, January 22, 2009

Folkvangar’s Decadence - Dark Walls

Folkvangar’s Decadence - Dark Walls
Folkvangar’s Decadence - Dark Walls
20 JPEG 2500x3000px 300dpi 33 Mb Rapidshare

20 grunge, dark and very damaged walls perfect for your gothic and dark art. An extremely versatile product with so many possibilities! Provided in jpg format. Size: 2500 x 3000 pixels. 300dpi. Perfect quality for printing.

Download:
http://rapidshare.com/files/187882811/booktraining_DarkWalls.rar
Password default : booktraining.net

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard, Marcus Pinto, "The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws"
Wiley | 2007-10-22 | ISBN: 0470170778 | 736 pages | PDF | 4,8 MB

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.



uploadbox.com

RS Link:
http://rapidshare.com/files/187732744/WeApHac.rar
Password default : booktraining.net

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions


Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
300 pages | IRM Press (March 28, 2008) | 1599048043 | PDF | 1,7 Mb

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this reference source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

Download - (1,7 Mb)

Uploading.com

Mirror
RS thingie for RS junkies:
http://rapidshare.com/files/187397395/51xY_oOowjL.rar

Password default : booktraining.net

Hack Proofing Linux : A Guide to Open Source Security


Hack Proofing Linux : A Guide to Open Source Security
Syngress Publishing; 1 edition | ISBN: 1928994342 | 704 pages | July 10, 2001 | PDF | 10 Mb

From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques.

Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.

* Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need
* CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community
* Uses forensics-based analysis to give the reader an insight to the mind of a hacker

USA,Canada, EU and Russia

Download here

Other countries:

Download from uploadbox.com

Download from rapidshare.com

Password default : booktraining.net

Hack Proofing Your Network (Re Upload)


Hack Proofing Your Network
Syngress Publishing; 2 edition | ISBN: 1928994709 | 842 pages | March 2002 | 8Mb | PDF

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:
* The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems

The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
Updated coverage of an international bestseller and series flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials
* A great addition to the bestselling "Hack Proofing..." series
* Windows 2000 sales have surpassed those of Windows NT
* Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp

USA,Canada, EU and Russia

Download here

Other countries:

Download from uploadbox.com

Download from rapidshare.com

Password default : booktraining.net

Hack Proofing Your Identity (ReUp)


Hack Proofing Your Identity
Syngress Publishing | ISBN: 1931836515 | 512 pages | June 15, 2002 | PDF | 7Mb

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.

Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.

Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.
Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.
Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.


USA,Canada, EU and Russia
Download here
Other countries:
Download from easy-share
Download from rapidshare.com

Password default : booktraining.net

Hack Proofing Your Network: Internet Tradecraft (ReUp)


Hack Proofing Your Network: Internet Tradecraft
Syngress | ISBN: 1928994156 | 450 pages | January 15, 2000 | PDF | 3MB

Too many network administrators depend on the "big sky" principle of network security--they believe that the large number of Internet-connected machines out there will keep black-hat hackers away. Hack Proofing Your Network: Internet Tradecraft points out that statistics are no defense, and that such an attitude is irresponsible. The book shows steps that you can take to harden your resources against attack. Although most of the material in this book isn't up-to-the-minute (how could it be, when the tactics of attackers change daily), you can discourage hackers by implementing the strategies that it describes.

Many antihacking texts assume a fair bit of knowledge, but this one doesn't. Ryan Russell and coauthors explain many terms and concepts, such as traffic sniffing, cryptography, and file differentiation ("diffing"), and the tools that evildoers use to wreak havoc on the systems that they attack--complete with Internet addresses from which you can download them. The book walks you through sample attacks, too, such as hijacking a connection by using a tool called Hunt. Overall, this is a fine introductory-to-intermediate antihacking volume that leads well into more current and advanced resources. You might want to supplement it with two other practical computer-security books: Hacking Exposed catalogues many of the tools that bad guys use, while Network Intrusion Detection helps you analyze security logs and spot attacks in progress.


USA,Canada, EU and Russia
Download here
Other countries:
Download from easy-share
Download from rapidshare.com

Password default : booktraining.net

Hack Proofing Your Ecommerce Site


Hack Proofing Your Ecommerce Site
Syngress | 2001-01-15 | ISBN: 192899427X | 512 pages | PDF | 5MB

When it comes down to it, the process of protecting your e-commerce site from malicious hackers isn't too different from that of setting up defenses around any other kind of Internet site. The only characteristic that distinguishes an e-commerce site from other kinds of sites is its ability to take payment information from customers, which means there's one more way to attack the site. The scores of techniques that can bring down ordinary sites apply to e-commerce sites as well. This is why Hack Proofing Your E-Commerce Site doesn't so much distinguish itself from the collection of "defending against hackers" books already out there, as supplement those books' content with additional material that's specific to e-commerce. This book treats site defense generally, with extra material on encrypted services and payment-protection schemes.

The sections specifically about buying and selling on the Internet--they make up about a third of this book--appear to have been well researched, and go beyond the merely technical to comment on the legal aspects of attacking digital money transactions. You'll probably learn a lot from the authors' discussions of laws designed to protect the consumer from fraud on the Internet and the amount of trouble they can cause e-commerce businesses. Those sections, since they cover material that's not well explained elsewhere, carry this book on their own. --David Wall

Topics covered: General issues of Internet site defense--including modes of attack (with emphasis on distributed denial of service), secure design principles, security policies, and incident response--supplemented by issues specific to electronic commerce. E-commerce subjects include legal matters, the Secure Electronic Transactions (SET) protocol, and relations with credit-card issuers.

USA,Canada, EU and Russia
Download here
Other countries:
Download from easy-share
Download from rapidshare.com

Password default : booktraining.net

Contemporary Security Management, 2 Ed


John Fay, "Contemporary Security Management, 2 Ed"
Butterworth-Heinemann | 2005-10-04 | ISBN: 075067928X | 544 pages | PDF | 4,3 MB

Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability assessments for various industries.
· Offers an experience-proven, practical approach to the business of security
· Includes case studies throughout the text provide real-world examples and solutions to management issues.
· Contains samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts


RS MIRROR: http://rapidshare.com/files/184339977/ContSecMan.zip

Password default : booktraining.net

Cyber Criminals on Trial


Russell G. Smith, Peter Grabosky, Gregor Urbas, "Cyber Criminals on Trial"
Cambridge University Press | 2004-10-25 | ISBN: 0521840473 | 262 pages | PDF | 1,3 MB

This book comprises an international study of the manner in which cyber criminals are currently handled by the judicial system. As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal--until now.


depositfiles.com


http://rapidshare.com/files/183411354/CybCrimTrial.zip
Password default : booktraining.net

Improvements in System Safety: Proceedings of the Sixteenth Safety-critical Systems Symposium, Bristol, UK, 5-7 February 2008 Felix Redmill, Tom Ande


Felix Redmill, Tom Anderson, "Improvements in System Safety: Proceedings of the Sixteenth Safety-critical Systems Symposium, Bristol, UK, 5-7 February 2008"
Springer | 2008-01-22 | ISBN: 1848000995 | 266 pages | PDF | 1,7 MB

Improvements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2008.
The Symposium is for engineers, managers and academics in the field of safety, across all industry sectors, and so the papers included in this volume offer a wide-ranging coverage of major safety issues as well as a good blend of academic research and industrial experience. They include discussions of some of the most recent developments in the field.
The book begins with a tutorial examining the recent marked shift in the regulatory approach to ensuring software safety. Whereas compliance with development standards used to be norm, the responsibility has now shifted on to the developers and operators to construct and present well reasoned arguments that their software is acceptably safe (in a system context). These arguments, together with supporting evidence, are typically assembled, structured and presented in a software safety case. This tutorial is crucial to all involved in the discipline and an excellent introduction to the topics subsequently discussed.
The first paper reflects a tutorial on The Safety Case held on the first day of the Symposium. The subsequent 14 papers are presented under the headings of the Symposiums sessions: Themes Reprised from SSS 07; The Safety Case; Safety Culture; Human Factors; Achieving and Improving System Safety; Safety and Risk Analysis.
This book will be of interest to both academics and practitioners working in the safety-critical systems arena.


Password default : booktraining.net

Contemporary Cryptography


Rolf Oppliger, "Contemporary Cryptography"
Artech House Publishers | May 1, 2005 | ISBN: 1580536425 | 510 pages | PDF | 7,6 MB

Whether you’re new to the field or looking to broaden your knowledge of contemporary cryptography, this comprehensive resource puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you a practical understanding of essential tools and applications to help you with your daily work. You also find complete coverage of the underpinnings and basic principles of cryptography to help you fully master the material.

From mathematical fundamentals and an overview of cryptographic systems… to details on unkeyed, secret key, and public key cryptosystems, this authoritative reference gives you solid working knowledge of the latest and most critical concepts, techniques, and systems in contemporary cryptography. Additionally, the book is supported with over 200 equations, more than 60 illustrations, and numerous time-saving URLs that connect you to Web sites with related information.

Enjoy this great book! Brought to you by SMIRK

Uploading

Letitbit

My AH blog!

RS mirror:

http://rapidshare.com/files/180860507/1580536425.rar

Password default : booktraining.net

Law, Infrastructure and Human Rights (Law in Context) By Michael B. Likosky


Michael B. Likosky. Law, Infrastructure and Human Rights
(Law in Context)
Cambridge Univ. Press | 2006 | 052185962X / 9780521859622 | 242 pages | PDF | 5 Mb | rar

From attacks on oil infrastructure in postwar reconstruction Iraq to the laying of gas pipelines in the Amazon rain forest through indigenous community villages, infrastructure projects are sites of intense human rights struggles.
Many state and nonstate actors have proposed solutions for handling human rights problems in the context of specific infrastructure projects. Solutions have been admired for being lofty in principle; however, they have been judged wanting in practice.
This book analyzes how human rights are handled in varied contexts and then assesses the feasibility of a common international institutional solution under the auspices of the United Nations to the alleged problem of the inability to translate human rights into practice.


1 Introduction
Part 1 Framework
2 Transnational public-private partnerships
3 Human rights risks
Part 2 Case Studies
4 Iraq
5 Antiterrorism
6 Banks
7 EU enlargement
8 Antipoverty
9 Toward a human rights unit

RS Download

BigBrother IF Mirror



Password default : booktraining.net

Burkhard Schröder : Tron - Tod eines Hackers


Burkhard Schröder : Tron - Tod eines Hackers
Pages: 221 | PDF | Rowohlt Tb., 2002 | ISBN: 349960857X | 0,6 MB




uploaded.to

or

depositfiles.com

Password default : booktraining.net

Desktop Witness: The Do's & Don'ts of Personal Computer Security


Desktop Witness: The Do's & Don'ts of Personal Computer Security
Wiley | ISBN: 0471486574 | 2002-05-13 | PDF | 250 pages | 30 Mb


Do you trust your computer?
You shouldn't.

Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.

What is a desktop witness?
Your computer stores a record of every document you create, every e-mail you write or receive, which sites you visit on the Internet, even attachments which you don't open.

An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.

What can you do?
This straight-talking guide, with its easy-to-follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer-anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free-up valuable memory by showing you how to really delete the files your computer stores without your knowledge.

A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

Download

RS mirror
http://rapidshare.com/files/178625676/0471486574.zip

UP-mirror

http://www.uploading.com/files/LEBO2CG3/fg574.zip.html

Password default : booktraining.net

6000 Icons Crystal Collection

6000 Icons Crystal Collection   6000 Icons Crystal Collection
6000 Icons Crystal Collection
Crystal Icons Collection
High quality collection of over 6000 icons in .png format
128x128, 64x64, 48x48, 32x32, 24x24, 22x22, 16x16
27.83 MB | Rapidshare
http://rapidshare.com/files/187876055/booktraining_6000Crystal.rar
Password default : booktraining.net

Telephone Projects for the Evil Genius



. Listen up! Telephone Projects for the Evil Genius has everything you need to build and customize both wired and wireless phone gadgets that not only save you money, but also improve the quality of your life! . .

Using easy-to-find parts and tools for creating both retro and modern phone projects, this do-it-yourself guide begins with some background on the development of the landline phone and the cell. You'll review basic building techniques, such as installing components, building circuits, and soldering. Then you'll dive into the projects, which, while they range from easy to complex, are all designed to optimize your time and simplify your life! Telephone Projects for the Evil Genius:

* . . Features step-by-step instructions for 40 clever and practical phone projects, complete with 150 how-to illustrations .
* Shows you how to enhance both wire-connected phones and cell phones.
* Leaves room for you to customize your projects.
* Removes the frustration-factor-all the parts you need are listed, along with sources

. .

From simple phone gadgets to sophisticated remote control devices, Telephone Projects for the Evil Genius provides you with all the schematics, charts, and tables you need to complete such fun projects as:

* . . Ringing phone light flasher.
* Telephone amplifier.
* Telephone ring-controlled relay.
* Remote telephone bell project.
* Touch tone generator.
* Phone voice scrambler.
* Caller ID decoder project.
* TeleAlert phone pager and control.
* Wireless remote phone ringer.
* Conferencer.
* And much more!


3.2M pdf


uploading link

Password default : booktraining.net

Knowledge Discovery from Sensor Data



Addressing the issues challenging the sensor community, this book presents innovative solutions in offline data mining and real-time analysis of sensor or geographically distributed data. Illustrated with case studies, it discusses the challenges and requirements for sensor data-based knowledge discovery solutions in high-priority application. The book then explores the fusion between heterogeneous data streams from multiple sensor types and applications in science, engineering, and security. Bringing together researchers from academia, government, and the private sector, this book delineates the application of knowledge modeling in data intensive operations.


3.6M pdf


uploading link

Password default : booktraining.net

Designing Mobile Service Systems - Volume 2 Research in Design Series



This publication is the second in the Research in Design series. Design is an effort that enjoys a growing attention in the academic world. At Delft University of Technology design is a recognized part of science. Like other technical universities, Delft is rooted in the engineering field. In this book the authors contribute to the development of a design language for the service domain. In general the engineering discipline is expanding into a field that embraces perspectives of more disciplines and actors, next to the engineer who is responsible for the artefact. The domain in this volume is services. This is a field in which the involvement of different stakeholders with different interests in the design process is particularly a critical success factor.

A note on the second edition: improvements have been made to the text and illustrations.


1.9M pdf

uploadbox link

Password default : booktraining.net

Silverlight 2 Bible



Silverlight 2 is a powerful Internet application and Microsoft's solution for delivering rich, cross-platform, interactive experiences including animation, graphics, audio, and video for rich internet applications. The Silverlight 2 Bible, will provide you with a strong foundation in Silverlight whereby you will quickly be able to create and deliver a variety of Silverlight applications. This book will show you exactly how to build everything from basic Silverlight-enabled web pages with graphics and video, to professional, Silverlight-enhanced ASP.NET applications that link to powerful back-end services. The Silverlight 2 Bible will discuss development tools, such as Visual Studio 2008, as well as design tools such as Expression Blend, Expression Encoder and Deep Zoom Composer, which Microsoft has positioned for designing state of the art UI in Silverlight applications.

Create rich, cross-platform, interactive Web applications with Microsoft's new Silverlight and this essential guide. Designers will discover how to add animation, audio, video, and other high-impact effects. Programmers will cover Visual Studio®, .NET, and other programming tools, and work with Silverlight's presentation, commu-nications, and data frameworks. Packed with techniques, tips, and a 16-page color insert of striking examples, this is the book you need to succeed with Silverlight.

* Make the most of Silverlight—whether you're a designer or programmer
* Get up to speed on the architecture, frameworks, and plug-in
* Create custom buttons, scroll bars, and menus with XAML tools and brushes
* Use the Expression Suite to create stunning user interfaces with media and animations
* Encode metadata, add scripts to video, and learn smart media tricks
* Write code with C#, Visual Basic, JavaScript®, Python®, and other DLR languages
* Implement sockets, parse XML data, and use LINQ to query SQL databases


8.2M pdf

uploadbox link
Password default : booktraining.net

Be a Successful Green Builder



Increase Profits by Incorporating Sustainable Practices into Your Building Operations

Filled with environmentally friendly methods that reduce the impact of housing on natural areas, Be a Successful Green Builder contains everything needed to get started in the green building business and develop a thriving enterprise.

Successful contractor and bestselling author R. Dodge Woodson explains how to select green building products, understand zoning requirements associated with green building, write winning proposals, find suitable financing, and deal with brokers. He also reviews 20 key mistakes to avoid in building green. Be a Successful Green Builder features:

* A plain-English guide to developing a lucrative green building enterprise
* Information on selecting the best green building products
* Valuable tips on preparing winning bids
* Step-by-step advice on expanding a green building business


9.0M pdf

uploadbox link
Password default : booktraining.net

Motion Graphic Design: Applied History and Aesthetics



This definitive guide to the art and technique of motion graphics as an applied art enlightens and inspires to new artistic heights.


34.1M pdf

uploadbox link

Password default : booktraining.net

High Performance Multimedia:A Reader on the Technological, Cultural and Economic Dynamics of Multimedia



The focus of High Performance Multimedia is on the ever expanding European e-content industry. Production, aggregation and distribution of that content are the starting points to any future development towards a flourishing industry sector of the third millennium. Nevertheless, in addition to the diffusion of knowledge throughout the industry, digitalisation has completely changed the structure of the content business through the dissociation of content and media channel. This movement creates problems in the process of the business. Highest technological demands in time and money are limiting the size of e-content enterprises today. In contrast, its distribution is still being dominated by broadcasters and telecom providers that skim the biggest part of the profits. However, possibilities do arise when analyzing the industry of e-content. The European e-content market will be able to play a major role in the future by including all relevant players and their abilities. The challenge during the next years will be to stop the concentration on high-end technology and to create new adequate e-content services providing added value to everyone in Europe.


2.3M pdf

uploadbox link

Password default : booktraining.net

Payment Card Industry Data Security Standard Handbook



Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI DSS), addressing the payment card industry standard that includes requirements for security management, protection of customer account data, policies, procedures, network architecture, software design, and other critical protective measures. This all-inclusive resource facilitates a deeper understanding of how to put compliance into action while maintaining your business objectives.


0.7M pdf

uploadbox link

Password default : booktraining.net

Auto Repair For Dummies



The top-selling auto repair guide--400,000 copies sold--now extensively reorganized and updated

Forty-eight percent of U.S. households perform at least some automobile maintenance on their own, with women now accounting for one third of this $34 billion automotive do-it-yourself market. For new or would-be do-it-yourself mechanics, this illustrated how-to guide has long been a must and now it's even better. A complete reorganization now puts relevant repair and maintenance information directly after each automotive system overview, making it much easier to find hands-on fix-it instructions. Author Deanna Sclar has updated systems and repair information throughout, eliminating discussions of carburetors and adding coverage of hybrid and alternative fuel vehicles. She's also revised schedules for tune-ups and oil changes, included driving tips that can save on maintenance and repair costs, and added new advice on troubleshooting problems and determining when to call in a professional mechanic. For anyone who wants to save money on car repairs and maintenance, this book is the place to start.

Deanna Sclar (Long Beach, CA), an acclaimed auto repair expert and consumer advocate, has contributed to the Los Angeles Times and has been interviewed on the Today show, NBC Nightly News, and other television programs.

Keep your wheels on the road and out of the shop with this friendly guide to auto care. In plain and simple language, Deanna Sclar dispels the mysteries lurking under the hood by explaining every auto systemand shows you step by step how to diagnose problems, make uncomplicated repairs, and perform routine maintenance.

Discover how to:

*Keep your vehicle purring with routine maintenance

*Troubleshoot typical problems

*Remove small dings, dents, and rust

*Deal with flats and breakdowns

*Avoid getting confused by automotive jargon


15.9M pdf

uploadbox link


Password default : booktraining.net

Professional Office Business Application Development: Using Microsoft Office SharePoint Server 2007 and VSTO



Office business application (OBA) development leverages the Office environment with SharePoint Server 2007 and Visual Studio® tools for Office (VSTO) to build solutions that integrate the most important details of design, deployment, and development to Office tools that are used every day. Understanding the key elements of building and deploying an OBA is integral to bridge the gap between business data and the people who need it.

After two helpful introductory chapters that review the concepts and design patterns behind OBAs, Steve Fox and Bill Sheldon dive into discussing the ways of creating specific parts of an OBA. Using a sample sales forecast OBA throughout the book, the authors escort you from the client-side development of the sales forecast OBA to the SharePoint, server-side extensions so that you can learn firsthand how to build an OBA from end to end.

What you will learn from this book

* How various technologies connect to one another as part of a whole composite application
* How to add business intelligence through Excel® Web Services and key performance indicators
* Ways to break down a scenario into various components so you can understand the specifics
* Tips for deploying and securing your OBA server components

Who this book is for
This book is for developers who are interested in using the Office system as a platform for building composite applications. Familiarity with the .NET Framework, object-oriented programming, the Office applications, and Microsoft Office SharePoint Server 2007 is helpful.


11.0M pdf

uploadbox link
Password default : booktraining.net

Mathematical Analysis of Urban Spatial Networks



Cities can be considered to be among the largest and most complex artificial networks created by human beings. Due to the numerous and diverse human-driven activities, urban network topology and dynamics can differ quite substantially from that of natural networks and so call for an alternative method of analysis.

The intent of the present monograph is to lay down the theoretical foundations for studying the topology of compact urban patterns, using methods from spectral graph theory and statistical physics. These methods are demonstrated as tools to investigate the structure of a number of real cities with widely differing properties: medieval German cities, the webs of city canals in Amsterdam and Venice, and a modern urban structure such as found in Manhattan.

Last but not least, the book concludes by providing a brief overview of possible applications that will eventually lead to a useful body of knowledge for architects, urban planners and civil engineers.


10.7M pdf

uploadbox link

Password default : booktraining.net

Django 1.0 Template Development



A comprehensive, practical exploration of the usage and customization of Django's template system, including tutorials on pagination, caching, and internationalization. This book is for web developers and template authors who want to fully understand and utilize the Django template system. The reader should have completed the introductory tutorials on the Django project's website and some experience with the framework will be very helpful. Basic knowledge of Python and HTML is assumed.

The book does a good job of focusing in on the Django template system, specifically focusing on what a Web designer would need to know to work well with a back-end developer.

It includes just enough Python and Django knowledge to provide a good context and background to folks who already have to worry about balance, typography, color, standards compliance and browser incompatibilities.

I'd say that if you were a freelance Web designer who wanted to venture into doing some light development for clients you could start with the book and one other Python or Django reference to have enough knowledge to leverage the admin interface, generic views, and of course templates.

But if you're a designer working with a development team and you really don't care about caching, middleware or trailing commas on tuples you can easily skip past those sections and just stay focused on template coding.

My one pony request is that the book should talk a bit more about strategies for template inheritance, naming conventions, includes, template management and the like. But a lot of that knowledge is only applicable to folks in largish Django deployments and I could see where it'd overwhelm a designer just trying to learn the template system.


3.6M pdf

uploadbox link

Password default : booktraining.net

Professional Microsoft SharePoint 2007 Workflow Programming



SharePoint 2007 Workflow offers a vast array of rich workflow programming facilities so that you can implement and deploy your own custom workflows and activities, allowing you to create features and functions that were never before possible. Packed with practical, real-world examples and step-by-step recipes, this book presents you with detailed code walkthroughs and in-depth technical discussions to help you gain the skills, knowledge, and experience you need to develop and to deploy your own custom SharePoint workflows and activities.

You'll discover the similarities and differences between workflow programming and traditional procedural programming languages such as C#. You'll also explore workflow association and initiation input forms and examine how SharePoint takes advantage of the extensibility points of Windows Workflow Foundation to add support to specific functions of SharePoint. Along the way, you'll discover how to implement data description and manifest files to deploy your custom workflows and actions through SharePoint solution packages.

What you will learn from this book

* The standard SharePoint activities inherited from CallExternalMethodActivity and HandleExternalEventActivity activities
* How to take advantage of workflow security in your own custom workflows
* Techniques for implementing a custom workflow edit task input form and deploy it as part of the deployment of a site content type
* How to develop, deploy, and test a custom Office SharePoint Designer 2007 action
* Ways to use the XML markup language to describe your own custom actions and conditions to Office SharePoint Designer 2007

Who this book is for
This book is for SharePoint developers who have a basic understanding of Windows Workflow Foundation and SharePoint 2007, but are looking for more advanced coverage of SharePoint 2007 workflow and activity programming.


6.1M pdf

uploadbox link

Password default : booktraining.net

Professional Microsoft Windows Embedded CE 6.0



With its support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices, including Smartphones, PocketPCs, digital cameras, DVRs, VoIP, network routers, wireless projectors, robotics, data acquisition, human-machine interfaces, and more. Packed with straightforward exercises and helpful examples, this book is aimed at demonstrating how to perform various development tasks in the Windows Embedded CE 6.0 environment. You'll quickly come to view Windows Embedded CE 6.0 as an ideal operating system for developing a new generation of intelligent, multimedia, connected, and service-oriented embedded devices.

Author and Embedded CE expert Samuel Phung encourages you to develop Windows Embedded CE 6.0 applications by adapting the skills you already have. You'll learn to produce a new breed of intriguing embedded devices and you'll come to understand ways in which the Windows Embedded CE environment is efficient, developer-friendly, and easy to master.

What you will learn from this book

* How to build a customized CE 6.0 runtime image
* Various forms of debugging and the array of debugging tools
* Ways to develop managed-code and native-code applications for Windows Embedded CE using Visual Studio
* Techniques for deploying a Windows Embedded CE 6.0 device with BIOS Loader
* Methods available to autolaunch an application when CE starts
* How to create thin-client applications using the provided design templates
* Ways to customize the user interface when CE starts and replace the standard Explorer shell

Who this book is for

This book is for developers who are interested in learning what resources are available as part of the Windows Embedded CE tool chains and how to use them. A basic understanding of Visual C++, C#, or Visual Basic is helpful.


7.4M pdf

uploadbox link

Password default : booktraining.net

Professional Android Application Development



Offering an open development environment, Android represents an exciting new opportunity to write innovative applications for mobile devices. This book provides you with a hands-on guide to building these applications using the Android software development kit. It takes you through a series of sample projects, each introducing new features and techniques to get the most out of Android. You'll learn all about the basic functionality as well as discover how to utilize the advanced features with the help of concise and useful examples.

Beginning with an introduction to the Android software stack, the author examines the philosophy behind creating robust, consistent, and appealing applications for mobile phones. You'll get the grounding and knowledge that is needed to write customized mobile applications using the current Android 1.0 SDK. Plus, you'll also gain the flexibility to quickly adapt to future enhancements in order to build the most cutting-edge solutions.

What you will learn from this book

* Best practices for Android mobile development
* An introduction to Activities, Intents, the manifest, and resources
* How to create user interfaces with layouts and custom views
* Techniques to store and share your application data
* Instructions for creating map-based applications, using location-based services including GPS, and geocoding locations
* How to create and use background Services and Notifications
* Working with the accelerometers, compass, and camera hardware
* All about phone and networking hardware such as telephony APIs, SMS, and network management
* Advanced development topics, including security, IPC, and some advanced graphics and user interface techniques

Who this book is for
This book is for anyone interested in creating applications for the Android mobile phone platform. It includes information that will be valuable whether you're an experienced mobile developer or just starting out writing mobile applications.


4.3M pdf

uploadbox link
Password default : booktraining.net

Expert WSS 3.0 and MOSS 2007 Programming



Expert WSS 3.0 and MOSS 2007 Programming

Providing you with in-depth coverage of the WSS 3.0 and MOSS 2007 development framework, this book shares step-by-step recipes and real-world examples to help you develop the skills you need to become a proficient WSS 3.0 and MOSS 2007 developer.

Code-walkthroughs and in-depth technical discussions explore implementing features, list and field types, actions, site columns and site content types,application pages, and site definitions and site provisioning providers. Get detailed coverage of field-rendering server controls, web configuration modification via SharePoint® object model, extending the STSADM command line utility, feature receivers, custom timer jobs, feature dependency, and feature stapling. The book also covers event receivers (including list, item, and web event receivers), and reviews code access security and SharePoint Web parts. Plus, you'll learn how to package your SharePoint solution in a single deployment package and deploy it as a single unit.

What you will learn from this book

*
How to implement custom features, actions, application pages, list and field types, site columns and site content types, and site definitions and site provisioning providers
*
Techniques for modifying web configuration files via SharePoint object model, extending the STSADM command line utility, and implementing custom timer jobs
*
How to develop feature receivers, feature dependencies, and feature stapling
*
Ways to implement list, item, and web event receivers
*
How to implement SharePoint solution packages
*
Techniques for developing custom SharePoint Web parts
*
How to use the Business Data Catalog XML markup language to implement BDC application definition files

Who this book is for
This book is for SharePoint developers who are interested in exploring the programming capabilities of WSS 3.0 and MOSS 2007.


8.8M pdf

uploadbox link

Password default : booktraining.net

Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide



A serious source of information for those looking to reverse engineer business deals

It’s clear from the current turbulence on Wall Street that the inner workings of its most complex transactions are poorly understood. Wall Street deals parse risk using intricate legal terminology that is difficult to translate into an analytical model. Reverse Engineering Deals on Wall Street: A Step-By-Step Guide takes readers through a detailed methodology of deconstructing the public deal documentation of a modern Wall Street transaction and applying the deconstructed elements to create a fully dynamic model that can be used for risk and investment analysis.

Appropriate for the current market climate, an actual residential mortgage backed security (RMBS) transaction is taken from prospectus to model by the end of the book. Step by step, Allman walks the reader through the reversing process with textual excerpts from the prospectus and discussions on how it directly transfers to a model. Each chapter begins with a discussion of concepts with exact references to an example prospectus, followed by a section called "Model Builder," in which Allman translates the theory into a fully functioning model for the example deal. Also included is valuable VBA code and detailed explanation that shows proper valuation methods including loan level amortization and full trigger modeling.

Aside from investment analysis this text can help anyone who wants to keep track of the competition, learn from others public transactions, or set up a system to audit one’s own models.


3.8M pdf

uploadbox link
Password default : booktraining.net

Multimedia Broadcasting and Multicasting in Mobile Networks



Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals

Efficiency and cost effectiveness within multimedia delivery is fast becoming a hot topic in wireless communications, with mobile operators competing to offer inexpensive, reliable services. The selection of an appropriate technology and matching it with the offered mix of services will be essential to achieve the market success.

Multimedia Broadcasting and Multicasting in Mobile Networks discusses multimedia services, introducing the potentials and limitations of the multicasting and broadcasting technologies. The authors address the key points related to the deployment of the technology including digital rights management issues, particularly important in terms of the large, business scale deployment of multimedia services and business models. The book discusses the early trials and deployment of Internet Protocol Datacasting (IPDC) and Multimedia Broadcast/Multicast Service (MBMS) and offers an introduction to multicasting in wireless cellular networks.

Multimedia Broadcasting and Multicasting in Mobile Networks:

* Offers a tutorial introduction to multicasting in wireless cellular networks
* Provides an overview of the current technologies that deliver mobile multimedia, weighing of the potentials and limitations of various solutions
* Includes the early trials and deployment of Internet Protocol Datacasting (IPDC) and Multimedia Broadcast/Multicast Service (MBMS)
* Details Digital Rights Management (DRM), MediaFLO, Digital Multimedia Broadcasting (DMB), Terrestrial Integrated Services Digital Broadcasting (ISDB-T) and others
* Contains business models, trials and user feedback

This book provides mobile operators, graduate engineers, network designers and strategists in mobile engineering with a thorough understanding of mobile multimedia and its impact on the telecommunications industry. Undergraduate and postgraduate students studying telecommunications will also find this book of interest.


1.0M pdf


uploading link

Password default : booktraining.net

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking



Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.

Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?

After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.


2.1M pdf


uploading link



Password default : booktraining.net

iPhone in Action: Introduction to Web and SDK Development



The iPhone explodes old ideas of a cell phone. Its native SDK offers a remarkable range of features including easy-to-build graphical objects, a unique navigation system, and a built-in database, all on a location-knowledgeable device. Websites and web apps can now behave like native iPhone apps, with great network integration.

iPhone in Action is an in-depth introduction to both native and web programming for the iPhone. You'll learn how to turn your web pages into compelling iPhone web apps using WebKit, iUI, and Canvas. The authors also take you step by step into more complex Objective-C programming. They help you master the iPhone SDK including its UI and features like accelerometers, GPS, the Address Book, SQLite, and many more. Using Apple's standard tools like Dashcode, Xcode, and Interface Builder, you'll learn how to best use both approaches: iPhone web and SDK programming. This book is intended as an introduction to its topics. Proficiency with C, Cocoa, or Objective-C is helpful but not required.

What's Inside

* A comprehensive tutorial for iPhone programming
* Web development, the SDK, and hybrid coding
* Over 60 web, Dashcode, and SDK examples


4.5M pdf


uploading link

Password default : booktraining.net

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography



The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science.

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

* Cryptography
* Key generation and distribution
* The qualities of security solutions
* Secure co-processors
* Secure bootstrap loading
* Secure memory management and trusted execution technology
* Trusted Platform Module (TPM)
* Field Programmable Gate Arrays (FPGAs)
* Hardware-based authentification
* Biometrics
* Tokens
* Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analys


10.5M pdf


uploading link

Password default : booktraining.net

High Performance Parallel Database Processing and Grid Databases



The latest techniques and principles of parallel and grid database processing

The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel database processing within a major database management system (DBMS). This important new book provides readers with a fundamental understanding of parallelism in data-intensive applications, and demonstrates how to develop faster capabilities to support them. It presents a balanced treatment of the theoretical and practical aspects of high-performance databases to demonstrate how parallel query is executed in a DBMS, including concepts, algorithms, analytical models, and grid transactions.

High-Performance Parallel Database Processing and Grid Databases serves as a valuable resource for researchers working in parallel databases and for practitioners interested in building a high-performance database. It is also a much-needed, self-contained textbook for database courses at the advanced undergraduate and graduate levels.


2.1M pdf


uploading link


Password default : booktraining.net

Expert Oracle Database 11g Administration



Sam Alapati’s Expert Oracle Database 11g Administration is a comprehensive handbook for Oracle database administrators (DBAs) using the latest release of the Oracle Database (Oracle Database 11g). All key aspects of database administration are covered, including backup and recovery, day–to–day administration and monitoring, performance tuning, and more. This is the one book to have on your desk as a continual reference. Refer to it frequently. It’ll help you get the job done.

* Comprehensive handbook for Oracle DBAs. Covers all major aspects of database administration.
* Tests and explains in detail key DBA commands.
* Offers primers on Linux/Unix, data modeling, SQL, and PL/SQL.


What you’ll learn

* Prepare an environment for Oracle. Configure the system. Install the software. Create a database.
* Monitor your database environment day–to–day with confidence that you will detect and resolve problems before they become emergencies.
* Get the most out of Oracle Database 11g by taking full advantage of its management features and cutting–edge technologies.
* Back up your database and be able to recover it if needed.
* Secure your database, in terms of both regulatory compliance and user management.
* Troubleshoot and resolve connectivity, network, and performance problems.
* And more!


Who is this book for?

Expert Oracle Database 11g Administration is written for Oracle database administrators who want a comprehensive reference to refer to during their day–to–day work. It’s clearly written in a way that is accessible to both intermediate and beginning administrators. Readers can easily and quickly find the content they need


8.4M pdf


uploading link

Password default : booktraining.net

CompTIA Security+ Deluxe Study Guide




Deluxe Edition of our top-selling CompTIA Security+ Study Guide

Prepare for CompTIA's new Security+ exam (SY0-201) with this Deluxe Edition of Sybex's popular CompTIA Security+ Study Guide. In addition to comprehensive coverage of exam essentials, the Deluxe Edition includes over one hundred additional pages of hands-on exercises, four practice exams, a list of useful acronyms any security professional should be familiar with, and a valuable Security Administrator's Troubleshooting Guide. Start your Security+ preparation today with:

* Full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam
* More than one hundred extra pages of practical, hands-on exercises to reinforce critical skills
* A valuable Security Administrator's Troubleshooting Guide you can use in the field
* Real-world scenarios that put what you've learned in the context of actual job roles
* Four complete practice exams as well as challenging review questions to prepare you for exam day
* Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
* A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective

Look inside for complete coverage of all exam objectives.


10.0M pdf

uploading link

uploading.com


Rapidshare.com

Rapidshare.com Mirror

RS mirror: http://rapidshare.com/files/171680570/CompSec.rar
Password default : booktraining.net

Antennas: From Theory to Practice



Practical, concise and complete reference for the basics of modern antenna design

Antennas: from Theory to Practice discusses the basics of modern antenna design and theory. Developed specifically for engineers and designers who work with radio communications, radar and RF engineering, this book offers practical and hands-on treatment of antenna theory and techniques, and provides its readers the skills to analyse, design and measure various antennas.

Key features:

* Provides thorough coverage on the basics of transmission lines, radio waves and propagation, and antenna analysis and design
* Discusses industrial standard design software tools, and antenna measurement equipment, facilities and techniques
* Covers electrically small antennas, mobile antennas, UWB antennas and new materials for antennas
* Also discusses reconfigurable antennas, RFID antennas, Wide-band and multi-band antennas, radar antennas, and MIMO antennas
* Design examples of various antennas are provided
* Written in a practical and concise manner by authors who are experts in antenna design, with experience from both academia and industry

This book will be an invaluable resource for engineers and designers working in RF engineering, radar and radio communications, seeking a comprehensive and practical introduction to the basics of antenna design. The book can also be used as a textbook for advanced students entering a profession in this field.


5.5M pdf


uploading link

Password default : booktraining.net

Charging for Mobile All-IP Telecommunications



This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile telecommunications incorporates data applications with real-time control and management, and requires a convergent and flexible online charging system. Such convergence is essential to mitigate fraud and credit risks in order to provide more personalized information to users about charges and credit limit controls.

Charging for Mobile All-IP Telecommunications provides comprehensive and practical coverage of online and offline charging based on mobile operator experiences, and the latest efforts undertaken by the UMTS specifications.

Key features:

* Presents a complete overview of the telecommunications charging system, including the evolution from 2G to 3G and all-IP network charging frameworks
* Discusses all management aspects related to charging and billing processes, with a focus on the major trends and developments within the telecoms industry
* Provides an overview of the telecom networks such as PSTN, GSM, UMTS and IMS
* Covers the concepts of the telecom charging on mobile services and the new technologies for implementing online charging system, such as GTP’ and Diameter protocol
* Contains coverage on network nodes and data flows in relation to charging of mobile applications, such as IMS call and content downloading
* Explains the IP-based online charging system, protocol details and recent trends in charging for mobile telecom industry

This book is an invaluable resource for graduate students, telecoms and IP engineers, network service providers and system architects. Information technologists and networking equipment manufacturers will also find this book insightf


3.6M pdf


uploading link

Password default : booktraining.net

Modelling the Wireless Propagation Channel: A simulation approach with Matlab



A practical tool for propagation channel modeling with MATLAB® simulations.

Many books on wireless propagation channel provide a highly theoretical coverage, which for some interested readers, may be difficult to follow. This book takes a very practical approach by introducing the theory in each chapter first, and then carrying out simulations showing how exactly put the theory into practice. The resulting plots are analyzed and commented for clarity, and conclusions are drawn and explained from the obtained results.

Key features include:

* A unique approach to propagation channel modeling with accompanying MATLAB® simulations to demonstrate the theory in practice
* Contains step by step commentary and analysis of the obtained simulation results in order to provide a comprehensive and structured learning tool
* Covers a wide range of topics including shadowing effects, coverage and interference, Multipath Narrowband channel, Multipath Wideband channel, propagation in micro and pico-cells, the land mobile satellite (LMS) channel, the directional Multipath channel and MIMO and propagation effects in fixed radio links (terrestrial and satellite)
* The book comes with an accompanying website that contains the MATLAB® simulations and allows readers to try them out themselves
* Well suited for lab-use, as reference and as a self-learning tool both for advanced students and professionals

Modeling the Wireless Propagation Channel: A simulation approach with MATLAB® will be best suited for postgraduate (Masters and PhD) students and practicing engineers in telecommunications and electrical engineering fields, who are seeking to familiarise themselves with the topic without too many formulas. The book will also be of interest to network engineers, system engineers and researchers


6.5M pdf


uploading link

Password default : booktraining.net

Why IPTV: Interactivity, Technologies, Services



Find out how modern IPTV technologies will change your experience of television.

Internet Protocol Television (IPTV) is rapidly being deployed as a compliment service to existing distribution technologies.

Why IPTV? traces the changes in Internet Protocol Television since the mid-1990s and examines what IPTV means today. The author analyzes what delivery of TV over an IP network means, both in terms of possibilities for new services, and in terms of the impact on the network and how it has to be managed. In addition, Why IPTV? helps you understand how introducing IPTV into the Web 2.0 world will impact the new services. It looks at the current trends in the consumer electronics industry as well as the network industry, and describes how the new technology can enhance and extend the existing business models in the TV industry, particularly in advertising; and also how it creates new possibilities, for instance, through personalization.

Why IPTV? Interactivity, Technologies, Services:

* Provides an accessible introduction to IPTV.

* Covers the technology to build IPTV systems, and shows what lies beyond traditional business models and existing distribution technologies.

* Considers how IPTV technologies can exploit and change the current trends in consumer electronics and network industry.

* Explores how the merging of Web 2.0 and IPTV will open new opportunities for services.

* Addresses hot topics such as IPTV Interaction and Channel Switching, Networking and Streaming with Information Management Systems, Advertising and Personalization of IPTV.

Why IPTV? will provide engineers in networking, TV broadcast companies, technology specialists in content creation companies and people in the IPTV industry (including management) with an engaging and insightful reference into Internet Protocol Television.


1.1M pdf


uploading link

Password default : booktraining.net

Multi-Carrier and Spread Spectrum Systems: From OFDM and MC-CDMA to LTE and WiMAX



The technological progress in multi-carrier (MC) modulation led orthogonal frequency division multiplexing (OFDM) to become an important part of beyond 3G cellular mobile communication standards, including LTE and WiMAX. In addition, the flexibility offered by the spread spectrum (SS) and time division multiplexing (TDM) techniques motivated many researchers to investigate several MC combined multiple access schemes, such as MC-CDMA, OFDMA and MC-TDMA. These schemes benefit from the advantages of each sub-system and offer high flexibility, high spectral efficiency, simple detection strategies and narrow-band interference rejection capability.

Multi-Carrier and Spread Spectrum Systems is one of the first books to describe and analyze the basic concepts of multi-carrier OFDM transmission and its combination with spread spectrum (MC-CDMA). The different architectures and detection strategies as well as baseband-related transceiver components are explained. This includes topics like FEC channel coding and decoding, modulation and demodulation (IFFT/FFT), digital I/Q-generation, time and frequency synchronisation, channel estimation, frequency domain equalization and RF aspects such as phase noise and non-linearity issues. Concrete examples of its applications for cellular mobile communication systems (B3G/4G) are given. Further derivatives of MC-SS (such as OFDMA, SS-MC-MA and DFT-spread OFDM) and their corresponding applications in the LTE, WiMAX, WLAN and DVB-RCT standards are detailed. Capacity and flexibility enhancements of multi-carrier OFDM systems by different MIMO diversity techniques such as space time/frequency coding (STC, SFC) and software defined radio concepts are also described.

Written in a highly accessible manner this book provides a unique reference on the topics of multi-carrier and spread spectrum communications, assisting 4G engineers with their implementation.

# Fully updated new edition of successful text, including two new chapters on LTE and WiMAX

# Describes in detail new applications of OFDM in mobile communication standards

# Examines all multi-carrier spread spectrum schemes, with in-depth analysis, from theory to practice

# Introduces the essentials of important wireless standards based on multi-carrier/spread spectrum techniques.


2.3M pdf


uploading link

Password default : booktraining.net

Digital Equipment Vector Icons


Digital Equipment Vector Icons
EPS Vector | PNG | Jpeg Preview | 5.85 Mb | RS

Download from Rapidshare:

http://rapidshare.com/files/155539608/Digital_Equipment_Vector_Icons.rar

Password default : booktraining.net

HTML, XHTML, and CSS: Your visual blueprint for designing effective Web pages



If you’ve ever been curious about any of the multitude of internet acronyms, the web technologies they represent, and how they can benefit you, this book is a great place to start. This book covers all the necessary topics to get up and running with HTML, XHTML, and CSS while offering readers a guide to modern, standards-based design. Key tasks covered in the book include setting up a Web page, reducing image resolution, creating radio buttons, adding a hit counter, adding an embedded sound, adding content from other sites such as integrating a blog and creating an RSS feed. Large topics are broken into smaller, more approachable sub-topics that are clearly explained on two pages eliminating the back and forth page flipping required in other references. Arranged so that skills build progressively throughout the book coupled with bold page headers it is simple to flip through and easily find any section or topic you are looking for. Understandable with straightforward terms that avoid intimidating and unexplained jargon, this is a book that will benefit complete novices and advanced users alike.

While primarily focused on the technologies outlined in the title, this book goes on to provide tips on integrating with Google, Flickr, social bookmark sites and even creating and implementing RSS feeds. Rest assured, each of these technologies is explained with the benefits of each outlined. A serious resource that quickly and concisely gets to the point, this book helps you gain real skills that will have you online in short order. Best of all, you can be confident that you are doing so the right way.

HTML, XHTML, and CSS: Your visual blueprint™ for designing effective Web pages offers visual learners a solid reference that employs straight forward examples to teach you to create and design Web pages with impact. "Apply It" and "Extra" sidebars highlight useful tips and high-resolution screen shots clearly illustrate each task while succinct explanations walk you through the examples. The associated website contains all the needed code to learn HTML.

Welcome to the only guidebook series that takes a visual approach to professional-level computer topics. Open the book and you'll discover step-by-step screen shots that demonstrate over 150 key HTML, XHTML, and CSS techniques, including:

* Creating a link to a page on the Web
* Laying out pages using Cascading Style Sheets
* Adding background images to page elements
* Adding a table to a page
* Making complex tables accessible
* Creating a form
* Replacing headers with images
* Creating tabbed navigation
* Submitting your site to search engines
* Adding JavaScript® to a page
* High-resolution screen shots demonstrate each task
* Succinct explanations walk you through step by step
* Two-page lessons break big topics into bite-sized modules
* "Apply It" and "Extra" sidebars highlight useful tips


26.5M pdf

booktraining.net_HTML__XHTML__and_CSS_Your_visual_blueprint_for_designing_effective_Web_pages.rar
HTML_Your_visual_blueprint_for_designing_effective_Web_pages.rar

http://rapidshare.com/files/222696558/HTML_Your_visual_blueprint_for_designing_effective_Web_pages.rar


Password default : booktraining.net

The Cable and Telecommunications Professionals' Reference, Volume 2, Third Edition: Transport Networks



A thorough reference for any telecommunications or networking professional who needs to understand the convergence of telephony, data transfer, and wireless communications, from simple descriptions down to the math.

Volume 2 of TERB 3ed covers the convergence of telephony and data transport, including wireless networks. Now that data is becoming the predominant source of traffic more efficient multiplexing schemes and more flexible control methods are needed in the transport network, such as giving the customer the ability to call for bandwidth on demand. With the development of control methods for switched data services it is now recognised that improved ways to control the transport network are possible and standards initiatives are taking place to establish and improve the network control layer. Detailed explanation of propagation in wireless and optical fibre systems requires a substantial amount of mathematics, also covered in this volume. For each of the math chapters there is an explanation of why the mathematics is important, where it is applied and references to other chapters.

* AUTHORITATIVE: All contributors are recognized experts in their field and come from leading institutions.
* INTERNATIONAL: In this age of globalization and standardization, special attention has been paidboth topically and authorially--to ensure the broad applicability and relevance of this material.
* EXHAUSTIVE: A thorough reference describing the convergence of telephony and data transport, including wireless networks.


5.8M pdf


uploading link

Password default : booktraining.net

Handbook of Granular Computing



Although the notion is a relatively recent one, the notions and principles of Granular Computing (GrC) have appeared in a different guise in many related fields including granularity in Artificial Intelligence, interval computing, cluster analysis, quotient space theory and many others. Recent years have witnessed a renewed and expanding interest in the topic as it begins to play a key role in bioinformatics, e-commerce, machine learning, security, data mining and wireless mobile computing when it comes to the issues of effectiveness, robustness and uncertainty.

The Handbook of Granular Computing offers a comprehensive reference source for the granular computing community, edited by and with contributions from leading experts in the field.

* Includes chapters covering the foundations of granular computing, interval analysis and fuzzy set theory; hybrid methods and models of granular computing; and applications and case studies.
* Divided into 5 sections: Preliminaries, Fundamentals, Methodology and Algorithms, Development of Hybrid Models and Applications and Case Studies.
* Presents the flow of ideas in a systematic, well-organized manner, starting with the concepts and motivation and proceeding to detailed design that materializes in specific algorithms, applications and case studies.
* Provides the reader with a self-contained reference that includes all pre-requisite knowledge, augmented with step-by-step explanations of more advanced concepts.

The Handbook of Granular Computing represents a significant and valuable contribution to the literature and will appeal to a broad audience including researchers, students and practitioners in the fields of Computational Intelligence, pattern recognition, fuzzy sets and neural networks, system modelling, operations research and bioinformatics.


12.3M pdf


uploading link



Password default : booktraining.net
This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at youzhny197@gmail.com, we will immediately respond to you.